2016
DOI: 10.1080/07421222.2016.1172440
|View full text |Cite
|
Sign up to set email alerts
|

Impact of Network Structure on Malware Propagation: A Growth Curve Perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 58 publications
0
8
0
1
Order By: Relevance
“…ln (v) nµL. (11) Obviously, C (K/n ) is always greater than zero. At this time, C (0) < 0 can be expressed as…”
Section: Optimal Allocation Of Cybersecurity Investmentmentioning
confidence: 99%
See 2 more Smart Citations
“…ln (v) nµL. (11) Obviously, C (K/n ) is always greater than zero. At this time, C (0) < 0 can be expressed as…”
Section: Optimal Allocation Of Cybersecurity Investmentmentioning
confidence: 99%
“…Interdependent firms and branches interconnect their databases or share information to improve the efficiency of information exchanges [8,9], which in turn would expose the participating firms or branches to security risks. On the one hand, participating firms or branches physically connect to each other through a mutual trust network or interface, and the other information systems will become vulnerable if any of them are compromised by hackers, which makes it easier for hackers to penetrate their systems via mutual trusted IT infrastructure, e.g., local area networks (LANs) and wide area networks (WANs), and steal sensitive data [10,11]. For example, Cainiao, the logistic arm of Alibaba, run the largest logistics database all over the world by establishing a platform integrating information resources of third-party logistics systems [12].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Menggambarkan jaringan teknologi yang dihasilkan, diwakili oleh grafik yang tidak diarahkan. [12] Gambar 2. Technological Network Setiap paket berpindah dari sumber ke tujuan dengan dua protokol berbeda yang menggunakan port TCP dan UDP dan kedua protokol tersebut memiliki hingga 65.536 port yang berbeda.…”
Section: Hasil Dan Pembahasan a Gambaran Umumunclassified
“…The logical centralization of network intelligence presents exciting challenges and opportunities to enhance security in such networks, including new ways to prevent, detect, and react to threats, as well as innovative security services and applications that are built upon SDN capabilities. Malicious code detection and prevention under the new architecture need further study [7][8][9][10][11][12][13][14].…”
Section: Research Trends and Gapsmentioning
confidence: 99%